
Macquarie University
Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery
Beginner · Course · 1 - 3 Months

Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Digital Forensics, Information Systems Security, Cybersecurity, Cloud Security, Security Controls, Cloud Computing
Beginner · Course · 1 - 4 Weeks

University of California, Irvine
Skills you'll gain: digital literacy, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Technology Strategies
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Digital Forensics, Data Security, Network Analysis, Exploit development, Malware Protection, Vulnerability Assessments
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Computer Systems, Informatics, Data Processing, Data Sharing, Computing Platforms, Bioinformatics, Data Storage, Computer Literacy, Computer Hardware, Big Data, Capacity Management, Data Centers, Computer Security Awareness Training, Cloud Computing, Oncology
Beginner · Course · 1 - 3 Months

Skills you'll gain: System Monitoring, Computer Security Incident Management, Network Analysis, Data Integrity
Beginner · Course · 1 - 4 Weeks

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Cyber Security Assessment, Application Security, Unix, Vulnerability Assessments, Unix Shell, Computer Architecture, Unix Commands, Linux Commands, Scripting, Linux, Debugging, Authentications, File Management
Build toward a degree
Intermediate · Course · 1 - 3 Months

University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Beginner · Course · 1 - 3 Months

Starweaver
Skills you'll gain: Digital Forensics, Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Cyber Security Policies, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Data Collection, Analysis, Management Reporting
Beginner · Course · 1 - 3 Months

Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Threat Hunting, Cyber Attacks, Threat Detection, Security Management, Digital Forensics, Disaster Recovery, Malware Protection, Vulnerability Assessments, Network Analysis, Technical Communication
Beginner · Course · 1 - 4 Weeks

University of Colorado System
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Data Security, Information Assurance, Authentications, Network Protocols
Build toward a degree
Beginner · Course · 1 - 3 Months

Universidades Anáhuac
Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption
Intermediate · Course · 1 - 3 Months